arboretum 发表于 2025-3-28 17:54:23

Feistel Structures for MPC, and Morexibility of using smaller (prime) fields. In the area of recently proposed ZK-based PQ signature schemes where MiMC was not competitive at all, our new design has 30 times smaller signature size than MiMC.

orient 发表于 2025-3-28 19:56:27

http://reply.papertrans.cn/24/2339/233862/233862_42.png

fixed-joint 发表于 2025-3-28 23:12:36

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacyaddition and bitmap index. The new scheme can achieve both forward and backward privacy with one roundtrip. In particular, the backward privacy we achieve in our scheme (denoted by Type-I.) is stronger than Type-I. Moreover, our scheme is very practical as it involves only lightweight cryptographic

palliate 发表于 2025-3-29 03:19:40

http://reply.papertrans.cn/24/2339/233862/233862_44.png

诙谐 发表于 2025-3-29 09:10:15

The Cognitive Neuroscience of Metacognitionidentified security checks, we then develop multiple analyzers that detect three classes of common yet critical semantic bugs in OS kernels, including NULL-pointer dereferencing, missing error handling, and double fetching. We implemented both the identification and the analyzers as LLVM passes and

engender 发表于 2025-3-29 12:40:43

Bennett L. Schwartz,Fernando Díaz binaries. We evaluated . on large datasets extracted from selected open-source C++ projects in GitHub, Google Code Jam events, and several programming projects, comparing it wiexperimental results demonstrate that . characterizes a larger number of authors with a significantly higher accuracy (abov

hypertension 发表于 2025-3-29 19:29:31

http://reply.papertrans.cn/24/2339/233862/233862_47.png

Euthyroid 发表于 2025-3-29 23:34:49

Bennett L. Schwartz,Fernando Díaziler extension capable of removing unneeded code from shared libraries and—with the help of domain knowledge—also capable of removing unused functionalities from an interpreter’s code base during the compilation process. Our evaluation against a diverse set of real-world applications, among others .

dithiolethione 发表于 2025-3-30 00:09:30

The Life Cycle of Scientific Specialtiesed protocol did not include a concrete security definition, meaning that all of the subsequent works following Chow lack the formal proofs needed to determine whether or not it delivers a secure solution to the key escrow problem..In this paper, based on Chow’s work, we formally define an IBE scheme

博识 发表于 2025-3-30 05:07:13

Contexts of Science: Sciences of Sciencectical forward secrecy than traditional forward-secure public key encryption, in which the decryption capacity of those received and unreceived emails is revoked simultaneously. Besides, we propose a concrete construction of fs-PIBE with constant size of ciphertext, and prove its security in the sta
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computer Security – ESORICS 2019; 24th European Sympos Kazue Sako,Steve Schneider,Peter Y. A. Ryan Conference proceedings 2019 Springer Nat